Building an Effective Security Program
eBook - PDF

Building an Effective Security Program

  1. 444 pages
  2. English
  3. PDF
  4. Available on iOS & Android
eBook - PDF

Building an Effective Security Program

Book details
Table of contents
Citations

About This Book

Building an Effective Security Program provides readers with a comprehensive approach to securing the IT systems in use at their organizations. This book provides information on how to structure and operate an effective cybersecurity program that includes people, processes, technologies, security awareness, and training. This program will establish and maintain effective security protections for the confidentiality, availability, and integrity of organization information. In this book, the authors take a pragmatic approach to building organization cyberdefenses that are effective while also remaining affordable.

This book is intended for business leaders, IT professionals, cybersecurity personnel, educators, and students interested in deploying real-world cyberdefenses against today's persistent and sometimes devastating cyberattacks. It includes detailed explanation of the following IT security topics:

  • IT Security Mindset —Think like an IT security professional, and consider how your IT environment can be defended against potential cyberattacks.
  • Risk Management —Identify the assets, vulnerabilities and threats that drive IT risk, along with the controls that can be used to mitigate such risk.
  • Effective Cyberdefense —Consider the components of an effective organization cyberdefense to successfully protect computers, devices, networks, accounts, applications and data.
  • Cyber Operati ons—Operate cyberdefense capabilities and controls so that assets are protected, and intruders can be detected and repelled before significant damage can be done.
  • IT Security Awareness and Tra ining—Promote effective cybersecurity practices at work, on travel, and at home, among your organization's business leaders, IT professionals, and staff.
  • Resilient IT Security —Implement, operate, monitor, assess, and improve your cybersecurity program on an ongoing basis to defend against the cyber threats of today and the future.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Building an Effective Security Program by Chris Williams, Scott Donaldson, Stanley Siegel in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.

Information

Publisher
De Gruyter
Year
2020
ISBN
9781501506529
Edition
1

Table of contents

  1. Acknowledgments
  2. About the Authors
  3. Contents
  4. Introduction
  5. Chapter 1. The Digital Organization
  6. Chapter 2. Ever-Present Cyber Threats
  7. Chapter 3. Cyber Risk Management
  8. Chapter 4. Cyberdefense Concepts
  9. Chapter 5. Cybersecurity Drivers
  10. Chapter 6. Cyber Program Management
  11. Chapter 7. Cybersecurity Capabilities
  12. Chapter 8. Cybersecurity Operations
  13. Chapter 9. Cyber Awareness
  14. Chapter 10. Organization Cyber Awareness
  15. Chapter 11. Cyber Training
  16. Chapter 12. Measuring Cyber Performance
  17. Chapter 13. When Things Go Wrong
  18. Chapter 14. Looking to the Future
  19. Appendix A: Common Malware Threats
  20. Appendix B: Cyber Awareness and Cyber Training Topics
  21. Appendix C: Example Cyber Policy
  22. Appendix D: Online Cybersecurity Resources
  23. Glossary
  24. Index